无线传感器网络能量有效安全路由协议研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络是由一组传感器节点以自组织方式构成的无线网络,其目的是协作地感知、采集和处理网络覆盖的地理区域中感知对象的信息,并发布给观察者。无线传感器网络的应用前景非常广泛,主要表现在军事、环境、健康、家庭和其它商业领域等各个方面。
     由于节点的电池能量有限,在很多无人值守情况下节点不能频繁更换电池,因此最小化能量消耗是无线传感器网络协议和算法设计的关键要求。目前已经提出了很多无线传感器网络节能路由协议。以数据为中心的路由是一个普遍应用的方法,它使用基于属性的方法采集感知数据。定向扩散为无线传感器网络提供了一种强健、可扩展、节能的以数据为中心的路由协议,但是也有自身的缺点。例如,兴趣和探测数据采用广播方法在网络中散布,在密集的网络中,每个节点都要广播接收到的新的兴趣和探测数据。当网络节点覆盖严重时,定性扩散的方法就显得非常低效,导致很多重复广播。大量的广播消息竞争有限的无线信道造成数据包的频繁冲突,使节点能量快速消耗,严重影响了无线传感器网络的性能。本文提出了一种基于网格的定向扩散路由协议。在无线传感器网络中形成虚拟地理网格簇,簇中仅有一个节点负责兴趣和探测数据的广播,其它节点接收簇头节点的广播,执行传感任务,这些节点的数据传输都要经过簇头节点,簇头节点先对接收到的数据进行融和,再通过其它簇头节点转发给汇聚节点。实验表明,采用这种网格结构,不仅降低和平衡了网络能量消耗,而且定向扩散的优点得到了保留。
     由于无线传感器网络经常部署在开放区域,传感器节点容易遭受攻击,例如俘获,窃听,拒绝服务,虫洞,女巫攻击等。随着无线传感器网络应用的广泛深入,其安全问题也变得越来越重要,其安全性研究引起了研究人员和应用者的强烈关注。本文从基于网格的定向扩散协议出发,分析了分簇路由协议的易攻击性,分别从安全数据聚集、流量攻击检测和密钥管理三个角度增加了分簇协议的安全设计,并进行了安全性分析和仿真验证。
     首先,提出了一种基于信任的簇内数据聚集协议。数据聚集作为无线传感器网络的关键技术之一,能够在很大程度上减少传感器节点的通信量,节约节点的电池能量,从而延长传感器网路的生命周期。然而随着无线传感器网络越来越多地布置在恶劣的环境中,传感器节点很可能被敌人俘获,数据聚集安全所依赖的密钥将会泄露,从而使数据聚集的安全受到很大的威胁。本文引入邻居节点信任评估机制,由邻居节点互相监视数据聚集行为,根据监测结果,使用信任机制对节点的行为进行评价,从而识别出被俘节点,并基于信任评估选举安全簇头。由安全簇头依据对成员节点过去聚集行为的信任评估,进行可靠数据聚集。实验结果表明本文设计的信任机制,能够很好地应对被俘节点的攻击,保证数据聚集的安全。
     其次,提出了一种基于ARMA的流量攻击检测协议。在无线传感器网络中,如何准确和迅速地检测流量攻击,以保障网络设施的可用性,是一个极具挑战的安全问题。本文采用线性预测技术,为传感器节点建立了简单高效的ARMA(2,1)流量预测模型,进而设计了基于流量预测的流量攻击检测方案。根据节点担任的不同角色,实施不同的监视机制。通过选举虚拟簇头和监视节点,让它们联合检测簇头是否被俘并及时报警,同时结合了簇头对成员节点的检测。模拟实验表明,这些机制能够实时地预测流量攻击,且没有增加过多额外的开销,在有效抵御攻击的同时,延长了网络的寿命。
     最后,提出了一种基于安全节点的密钥管理协议。由普通节点和簇头节点负责数据采集及传输,安全节点负责密钥管理。文中详细介绍了安全节点的生成与在安全节点监控下簇头节点的生成以及节点密钥、对密钥、簇密钥、公共密钥的生成和管理。理论分析和实验表明,协议的通信能量消耗性能优越,生成密钥的延迟时间满足要求,可以提供多点协同认证的安全多对密钥,有很强的抗节点俘获能力,能支撑较大规模的网络。
Wireless sensor network(WSN) is a wireless network composed of a group of sensor nodes, which are deployed in an ad hoc fashion cooperate on sensing, collecting and processing the information of the covered area and then sending the information to the observer. WSN has wide application potential in military affairs, environment detecting, health affairs, home network and other commercial fields.
     Due to the limited battery capacity and characteristics of unattended operation after deployment, minimizing energy consumption is a key requirement in the design of sensor network protocols and algorithms. Various energy-efficient routing protocols have been proposed for wireless sensor networks. Data-centric routing is a commonly utilized approach that uses attribute-based addressing to perform the collective sensing task. Directed diffusion (DD) is a robust, scaled, and energy-efficient data dissemination protocol based on data-centric routing, but there are still some shortcomings associated with it. For example, interests are broadcasted in the network-wide range. Every node in the network forwards each new interest message to all of its neighbor nodes. The approach is rather inefficient in the sensor networks where the significant overlap between the neighbors of the two nodes in immediate vicinity can lead to a large number of unnecessary rebroadcasts. This additionally results in increased channel contention and waste of bandwidth that take further toll of the scarce energy resource of the nodes. The network-wide broadcast operations strongly influence the performance of the protocol. We proposed a grid-based directed diffusion inspired. The network area is firstly divided into fixed virtual grids. In each grid, only one node is responsible for broadcasting interest message, and the rest ones receive the interest from it. Due to rest nodes firstly sending data to the header node, more chances are provided to aggregate the redundant data information as early as possible. Simulations show that, utilizing the approach, broadcast overhead and data message are reduced. This results in large energy savings. At the same time, advantages of DD are also reserved.
     As WSN is usually deployed in open areas, sensor nodes are susceptible to a variety of attacks, such as capture, eavesdropping, denial of services, wormhole, and sybil attack. Along with WSN becoming hot spots in research and industry, the security aspects of WSN attract attentions of both researchers and engineers. According to DD, we analyze the possible attacks, and add security schemes such as secure data aggregation, traffic attack detection and key management to it. Then we perform security analysis and simulation.
     Firstly, we propose a trust-base data aggregation protocol in cluster. Data aggregation is thought to be one of the main technologies in wireless sensor networks, and can mostly reduce the whole networks’data transmission, save the sensor node’s battery energy, and so it prolongs the whole networks’life. But with wireless sensor network increasingly deployed in hostile environment, sensor nodes are easily captured by enemy, the secure keys that data aggregation needs will be revealed. And then data aggregation will be not secure. In this paper, we introduce trust evaluation scheme of neighbors and use the listen mechanism to watch sensor node’s data aggregation action. According to the listening result, we use trust mechanism to evaluate nodes’aggregation action, and recognize the captured nodes. Then we elect secure cluster head according to trust evaluation. Secure cluster head evaluates nodes’trust according to their past aggregation result, and performs reliable data aggregation. Simulations show that the proposed trust scheme can effectively deal with the threats of the captured nodes, and ensure the secure of the data aggregation.
     Secondly, we propose ARMA-based traffic attack detection protocol. In wireless sensor networks, how to accurately and rapidly detect traffic attack, so as to ensure the availability of network infrastructure, is one of the most challenging security problems. This paper proposes a simple and efficient ARMA(2,1) traffic prediction model for sensor nodes based on linear prediction technique. Then a traffic attack detection scheme based traffic prediction, is designed. According different roles of nodes, different monitoring schemes are used. Virtual cluster heads and monitoring nodes are elected to monitor cluster head. Member nodes are monitored by cluster head. Simulations show that the propose scheme can quickly detect traffic attack with less resource overhead, and prolong the lifetime of network.
     Lastly, we propose security node-based key management. Ordinary nodes and the cluster head node are responsible for data collection and transmission. Security nodes are responsible for key management. In this paper, we describe the formation of security nodes and the cluster head under control of the security nodes. We also describe the formation of foue kinds of key: node key, pair of keys, cluster key and public key. Performance analysis and experiments show that, the proposed key management protocol is superiority in communication and energy consumption. The delay time of the cluster key generation is to meet the requirements. It provides more coordinated and more security authentication key to effective anti-node arrived in the ability to capture. It supports large-scale networks.
引文
1 Estrin D, Govindan R, Heidemann J. Next Century Challenges: Scalable Coordinartion in Sensor Networks. Prceedings of the 5th Annual International Conference on Mobile Computing and Networks. 1999:263-270
    2 J. Agre, L. Clare. An Integrated Architecture for Cooperative Sensing Networks. IEEE Computer Magazine. 2000, 33(5):106-108
    3孙利民,李建中,陈渝,朱红松.无线传感器网络.清华大学出版社. 2005
    4于宏毅等.无线移动自组织网.北京人民邮电出版社. 2005
    5张豫鹤,黄希,崔莉.面向交通信息采集的无线传感器网络节点.计算机研究与发展. 2008, 45(1):110-118
    6荆琦,唐礼勇,陈洲峰,王昭.无线传感器网络应用支撑技术研究.计算机科学. 2008, 35(3): 22-27
    7 A. Talukder, A. Panangadan, T. Herrington. Autonomous adaptive resource management in sensor networks systems for environmental monitoring. Proceedings of Aerospace Conference. 2008: 1-9
    8赵泽,崔莉.一种基于无线传感器网络的远程医疗监护系统.信息与控制. 2006, 35(2): 265-269
    9 E. Shih, S. Cho, N. Ickes. Physical Layer Driven Protocol and Algorithm Design for Energy-efficient Wireless Sensor Networks. Proceedings of the ACM MobiCom. 2001: 272-286
    10 Y. Gao, K. Wu, and F. Li. Analysis on the Redundancy of Wireless Sensor Networks. Proceedings of ACM International Workshop on Wireless Sensor Networks and Applications. 2003: 108-114
    11 O. Younis, S. Fahmy. Heed: A Hybrid, Energy-efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks. IEEE Transactions on Mobile Computing. 2004, 3(4): 366-379
    12刘巍,崔莉,苗勇.一种支持QoS的传感器网络拓扑控制算法的设计与仿真.系统仿真学报. 2007, 19(21): 5075-5080
    13李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展.软件学报. 2003, 14(10): 1717-1727
    14 B. Warneke, M. Last, B. Liebowitz. Smart Dust: Communicating with a Cubicmillimete Computer. IEEE Computer Magazine. 2001, 34(1): 44-51
    15崔莉,鞠海玲.无线传感器网络研究进展.计算机研究与发展. 2005,42(1): 163-174
    16任丰原,黄海宁,林闯.无线传感器网络.软件学报. 2003,14(7): 1282-1291
    17 A. Perrig, J. Stankovic, D. Wagner. Security in Wireless Sensor Networks. Communications of the ACM. 2004, 47(6): 53-57
    18 A. Wood, A. Stankovic. Denial of Service in Sensor Networks. IEEE Computer. 2002, 35(10): 54-62
    19 H. Chan, A. Perrig. Security and Privacy in Sensor Networks. IEEE computer. 2003, 36(10): 103-105
    20 D. Braginsky, D. Estrin. Rumour Routing Algorithm for Sensor Networks. Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications. 2002, 22-31
    21裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述.通信学报. 2007, 28(8): 113-121
    22黄鑫阳,杨明,吕珊珊.安全高效的无线传感器网络密钥管理协议与仿真研究.系统仿真学报. 2008, 20(7): 1898-1903
    23胡宇舟,王雷,陈治平,顾学道.传感器网络中对偶密钥的动态密钥路径建立机制及算法.通信学报. 2008, 29(2): 52-65
    24夏戈明,黄遵国,王志英.基于对称平衡不完全区组设计的无线传感器网络密钥预分配方案.计算机研究与发展. 2008, 45(1): 154-164
    25曾玮妮,林亚平.传感器网络中一种基于分布式更新权限的组密钥管理方案.计算机研究与发展. 2007, 44(4): 606-614
    26陈海坤,石胜飞,李建中.基于通信半径动态调整的无线传感器网络密钥管理协议.计算机研究与发展. 2008, 45(1): 165-171
    27杨文国,郭田德,赵彤.基于动态规划的无线传感器网络的路由算法.计算机研究与发展. 2007, 44(5): 890-897
    28冯涛,马建峰.无线传感器网络密钥种子管理和分配模型及应用.计算机研究与发展. 2008, 45(1): 146-153
    29杨庚,程宏兵.一种有效地无线传感器网络密钥协商方案.电子学报. 2008, 36(7): 1389-1395
    30章睿,刘吉强,赵佳.一种基于ID的传感器网络密钥管理方案.电子与信息学报. 2009, 31(4): 929-932
    31 S. Hussain, F. Kausar, A. Masood. An Efficient Key Distribution Scheme for Heterogeneous Sensor Networks. Proceedings of 2007 International Conferenceon Wireless Communications and Mobile Computing. 2007: 388-392
    32 M. Younis, K. Ghumman, M. Eltoweissy. Location-aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Transactions on Parallel and Distrib. 2006, 17(8): 865-882
    33杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法.电子学报. 2007, 35(1): 180-184
    34 J. Lee, V. Leung. Key Management Issues in Wireless Sensor Networks: Current Proposals and Future Developments. IEEE Wireless Communication. 2007, 14(5): 76-84
    35 Y. Xiao, V. Rayi. A Survey of Key Management Schemes in Wireless Sensor Networks. Computer Communications. 2007, 30(11): 2314-2341
    36刘志宏,马建峰,黄启萍.基于区域的无线传感器网络密钥管理.计算机学报. 2006, 29(9): 1608-1616
    37潘耘,王励成,曹珍富,李剑.基于轻量级CA的无线传感器网络密钥预分配方案.通信学报. 2009, 30(3): 130-134
    38苏忠,林闯,任丰原.无线传感器网络中基于散列链的随机密钥预分发方案.计算机学报. 2009, 32(1): 30-41
    39沈玉龙,裴庆琪,马建峰. MMuTESLA:多基站传感器网络广播认证协议.计算机学报. 2007, 30(4): 539-546
    40王建萍,李明,周贤伟.基于声誉和信誉组的无线传感器网络实体认证研究.传感技术学报. 2008, 21(10): 1780-1784
    41 K. Bauer, L. Hyunyoung. A Distributed Authentication Scheme for a Wireless Sensing System. Proceedings of 2nd International Workshop on Networked Sensing Systems. 2005: 210-215
    42江灿明,徐海霞,李宝.无线传感器网络的分布式用户认证机制.中国科学院研究生院学报. 2008, 25(1): 80-85
    43 C. Karlog, D. Wagner. Secure routing in wireless sensor networks:Attacks and Countermeasures. Ad Hoc Netw. 2003, 1(2): 293-315
    44宋志高,陈菲.无线传感器网络路由协议的安全性分析与研究.计算机仿真. 2005, 22(5): 134-140
    45 A. Perrig, R. Szewezyk, V. Wen. SPINS: Security Protocols for Sensor Networks. Journal of wireless Networks. 2002,8(5): 521-534
    46孙雨耕,张聚伟,季浩,丁英强.基于超图理论的无线传感器网络安全路由算法.天津大学学报. 2008, 41(2): 175-182
    47王潮,贾翔宇,林强.基于可信度的无线传感器网络安全路由算法.通信学报. 2008, 29(11): 105-112
    48周贤伟,覃伯平.基于能量优化的无线传感器网络安全路由算法.电子学报. 2007, 24(4): 53-54
    49周贤伟,王培,覃伯平,申吉红.一种无线传感器网络异常检测技术研究.传感器学报. 2007, 20(8): 1870-1874
    50 Y. C. Hu, A. Peerig, D. Johoson. Wormhole Detection in Wireless Ad Hoc Networks. Technical Report. 2002, 7(1): 380-384
    51 L. Hu, D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. Proceedings of the 1lth Annual Network and Distributed System Security Symposium. 2004: 144-154
    52 B. Parno, A. Perrig, V. Gligor. Distributed Detection of Node Replication Attacks in Sensor Networks. Proceedings of 2005 IEEE Security and Privacy. 2005: 49-63
    53 A. Arora, P. Dutfa, S. Bapat. A line in the sand: a wireless sensor network for target detection, classification and tracking. Computer Networks. 2004, 46(5): 605-634
    54 R. Roman, J. Zhou, J. Lopez. Applying Intrusion Detection Systems to Wireless Sensor Networks. Proceedings of Consumer Communications and Networking Conference. 2006: 640-644
    55姚兰,高福祥,于戈. WSN中带有分布式入侵检测的分簇路由协议.东北大学学报. 2008, 29(10): 1402-1405
    56冯涛,马建峰.防御无线传感器网络Sybil攻击的新方法.通信学报. 2008, 29(6): 13-19
    57刘宁,范训礼,赵建华.一种无线传感器网络入侵检测系统模型.西南科技大学学报. 2009, 24(1): 78-81
    58杨黎斌,慕德俊,蔡晓妍.基于博弈理论的传感器网络拒绝服务攻击限制模型.传感技术学报. 2009, 22(1): 90-94
    59 C. Loo, M. Ng. Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks. 2006, 2(4): 313-332
    60 C. Intanagonwiwat, R. Govindan, D. Estrin. Directed Diffusion for Wireless Sensor Networking. IEEE Transactions on Networking. 2003, 11(1):2-16
    61 Xu Y, Heidemann J, Estrin D. Geography-informed energy conservation for ad hoc routing. Proceedings of the ACM International Conference on MobileComputing and Networking. 2001: 32-38
    62 A. Deshpande, C. Guestrin. Model-driven Data Acquisition in Sensor Networks. Proceedings of the 30th VLDB Conference. 2005: 588-599
    63 A. Cuzzocrea, F. Furfaro. A Grid Framework for Approximate Aggregate Query Answering on Summarized Sensor Network Readings. Proceedings of GADA’04. 2004: 25-29
    64徐建波,李仁发.无线传感器网络中一种新型的混合型数据收集协议.计算机研究与发展. 2008, 45(2): 254-260
    65 B. Krishnamachari, D. Estrin, S. Wicker. The Impact of Data Aggregation in Wireless Sensor Networks. Proceedings of the 22nd Int’l Conf on Distributed Computing Systems Workshops. 2002: 575-578
    66刘明,曹建农,陈贵海. EADEEG:能量感知的无线传感器网络数据收集协议.软件学报. 2007, 18(5): 1092-1109
    67黄旗明,南海燕.基于Dirichlet分布的无线传感器网络的信誉计算模型研究.传感技术学报. 2009, 22(4): 526-530
    68 C. Seng, W. Arbaugh. A Secure Trust Establishment Model. Proceedings of the IEEE Int’l Conf on Sensor Networks, Ubiquitous, and Trustworthy Computing. 2006: 78-85
    69 T. Ryutov, C. Neuman. Trust-based Approach for Improving Data Reliability in Industrial Sensor Networks. Proceedings of the IFIP Int’l Federation for Information. 2007: 349-365
    70 G. Crosby, N. Pissinou. A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks. Proceedings of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems. 2006: 13-22
    71 L. Huang, L. Li. Behaviou-based Trust in Wireless Sensor Networks. Proceedings of the APWeb Workshops 2006. 2006: 214-223
    72 R. Shaikh, H. Jameel. Trust Management Problem in Distributed Wireless Sensor Networks. Proceedings of the RTCSA. 2006: 411-414
    73 Z. Yao, D. Kim. A Security Framework with Trust Management for Sensor Networks. Proceedings of the 1st IEEE Workshop on Security and QoS in Communication Neworks Athens. 2005: 190-198
    74 W. Zhang, S. Das. A Trust-based Framework for Secure Data Aggregation in Wireless Sensor Networks. Proceedings of the IEEE SECON 2006. 2006: 60-69
    75 T. Roosta, M. Meingast. Distributed Reputation System for TrackingApplications in Sensor Networks.Proceedings of the 3rd Annual Int’l Conf. on Mobile and Ubiquitous Systems: Networking & Services. 2006: 1-8
    76 Z. Yao, D. Kim. PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security. Proceedings of the IEEE Int’l Conf. on Mobile Adhoc and Sensor System. 2006: 437-446
    77 M. Probst, S. Kasera. Statistical Trust Establishment in Wireless Sensor Networks. Proceedings of the Int’l Conf. on Parallel and Distributed Systems. 2007: 1-8
    78 R. Anderson, H. Chan. Key Infection: Smart Trust for Smart Dust. Proceedings of the 12th Int’l Conf. on Network Protocols. 2004: 206-215
    79 D. Wager. Resilient Aggregation in Sensor Networks. Proceedings of the ACM Work-shop on Security of Ad Hoc and Sensor Networks. 2004: 78-87
    80 HaowenChan, A.Perrig and D.Song. Secure hierarchical In-Network Aggregation in Sensor Networks. Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006: 278-287
    81 Bekara C, Laurent-Maknavicius M. A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks with no Requirements for Trusted Aggregator Nodes. Proceedingsof the 2007 International Conference on Next Generation Mobile Application, Services and Technoligies. 2007: 267-276
    82 L. Hu, D. Evans. Secure aggregation for wireless sensor networks. Proceedings of the IEEE workshop on Security and Assurance in Ad hoc Networks. 2003: 384-394
    83 B. Przydatek, D. Song, A. Perrig. SIA: Secure Information Aggregation in Sensor Networks, in Proceedings of ACM Sensys Conference. 2003: 255-265
    84 W.Du, J. Deng. A Witness-Based Approach for Data Fusion Assurance In Wireless Sensor Networks. Proceedings of the IEEE Global Communications Conference. 2003: 1435-1439
    85 J. Hur, Y. Lee. Trust-Based Secure Aggregation in wireless Sensor Networks. Proceedings of the 3rd International Conference on Computing, Communications and Control Technologies. 2005: 1-6
    86 W. Zhang, S. Das. A Trust-based Framework for Secure Data Aggregation in Wireless Sensor Networks. Proceedings of the 3rd Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. 2006: 60-69
    87荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理.软件学报. 2008, 19(7): 1716-1730
    88 Wei Zhang, Das, S.K., Yonghe Liu. A trust based framework for secure data aggregation in wireless sensor networks. Proceedings of the 3rd Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. 2006: 60-69
    89 M. Hsieh, Y. Huang. Adaptive Security Design with Malicious Node Detection in Cluster-based Sensor Networks. Computer Communications. 2007, 30(11): 2385-2400
    90 W. Du, L. Fang, P. Ning. Lad: Localization Anomaly Detection for Wireless Sensor Networks. Proceedings of the 19th IEEE international Parallel and Distributed Processing Symposium. 2005: 874-886
    91 F. Ye, H. Lu, L. Zhang. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. Proceedings of the IEEE Infocom. 2004: 2446-2457
    92 M. Demirbas, Y. Song. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Network. 2006: 564-570
    93 I. Krontiris, T. Dimitriu. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. Proceedings of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks. 2007: 150-161
    94 I. Onat and A. Miri. An Intrusion Detection System for Wireless Sensor Networks. Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. 2005: 253-259
    95 R. Roman, J. Zhou. Applying Intrusion Detection Systems to Wireless Sensor Networks. Consumer Communications and Networking Conference. 2006, l(1): 640-644
    96 A. Da-Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz. Decentralized Intrusion Detection in Wireless Sensor Networks. Proceedings of the 1st ACM International Workshop on QoS and Security for Wireless and Mobile Networks. 2005: 16-23
    97 C. Su, K. Chang, Y. Kuo. The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks. Proceedings of IEEE Wireless Communications and Networking Conference. 2005: 1927-1932
    98 J. Deng, R. Han. Defending against Path-based DoS Attacks in Wireless Sensor Networks. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2005: 89-96
    99俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测.计算机学报. 2006, 29(9): 1542-1552
    100 S. Doumit, D. Agrawal. Self-organized Criticality and Stochastic Learning-based Intrusion Detection System for Wireless Sensor Networks. Proceedings of IEEE Military Communications Conference. 2003: 609-614
    101 S. Rajasegarar, C. Leckie. Distributed Anomaly Detection in Wireless Sensor Netwoks. Proceedings of the 10th IEEE Singapore International Conference of Communication System. 2006: 1-5
    102 A. Agah, S. Das, K. Basu K. Intrusion Detection in Sensor Networks: A Non-cooperative Game Approach. Proceedings of IEEE International Conference on Communications. 2005: 3218-3222
    103 B. Krishnamachari, S. Lyengar. Distributed Bayesian Algorithms for Fault-Tolerantevent Region Detection in Wireless Sensor Networks. IEEE Transactions on Computers. 2004,53(3): 241-250
    104 E. Ngai, J. Liu. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. Proceedings of the IEEE International Conference on Communications. 2006: 3383-3389
    105张树京,齐立心.时间序列分析简明教程.北京:清华大学出版社. 2003
    106邹柏贤,刘强.基于ARMA模型的网络流量预测.计算机研究与发展. 2002, 39(12): 1645-1652
    107 D. Sanchez, H. Baldus. Determinstic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks. 2005:277-288
    108 L. Eschenauer, G. Virgil. A Key-Management Scheme for Distributed Sensor Networks. Proceedings of the 9th ACM Conference on Computer and Communication Security. 2002: 41-47
    109 H. Chan, A. Peerig. Random Key Predistribution Schemes for Sensor Networks. Proceedings of the 2003 IEEE Symp on Security and Privacy. 2003: 197
    110苏忠,林闯,封富君.无线传感器网络密钥管理的方案和协议.软件学报. 2007, 18(5): 1218-1231
    111 W. Du, J. Deng. A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks. Proceedings of the 10th ACM Conference on Computer and Communication Security. 2003: 42-51
    112 Blom R. An Optimal Class of Symmetric Key Generation Systems. Proceedings of the EUROCRYPT’84. 1984: 335-338
    113 D. Liu, P. Ning. Establishing Pair-wise Keys in Distributed Sensor Networks. Proceedings of the the 10th ACM Conference on Computer and Communications Security. 2003: 128-134
    114 G. Jolly, M. Kuscu. A Low-Energy Key Management Protocol for Wireless Sensor Networks. Proceedings of the 8th IEEE Symposium on Computer and Communications. 2003: 335-340
    115 M. Eltoweissy, M. Youis. Lightweight Key Management for Wireless Sensor Networks. Proceedings of the IEEE International Conference on Performance Computing and Communication. 2004: 813-818